Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Report from the second and final day of the FDA Workshop on Medical Device Security Like with my previous post on this topic, I am using a quote from one of the presenters to report on ...
Blog Entry by Axel Wirth | 23 Oct 2014 | 1 comment
At Symantec, we continue to develop solutions to help you secure your agile data center and proactively engage cyber security threats. Vision 2014, which is coming up in less than three days, offers up focused, ...
Blog Entry by vgtero | 02 May 2014 | 0 comments
Tips from the FTC on Fraud, Deception and Consumer Privacy It seems like every week another major company ...
Blog Entry by Matthew Nelson | 25 Apr 2014 | 0 comments
Targeted attacks are some of the most troubling and difficult threats facing modern security infrastructure. Symantec found that the number of targeted campaigns jumped to 91% in 2013. Discover more about these ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
An SSL certificate is a mode of authenticating a website and securing the transactions, as well as the data communicated through the website by users. ...
Blog Entry by smartblogger | 28 Jan 2014 | 0 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
Now, more than ever, is it important to demand that your cloud services provider provides complete transparency regarding the security and compliance measures they use and have in place to protect your companies’ sensitive information and intellectual ...
Blog Entry by phlphrrs | 27 Aug 2013 | 0 comments
Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by Robert Shaker | 29 Jul 2013 | 4 comments
SSL certificate has been used to secure credit card transactions, login and transfer of data. It has recently been used to secure browsing in social media sites. This certificate ...
Blog Entry by smartblogger | 04 Jul 2013 | 0 comments
You must have been taking a long (and probably well deserved) holiday if you have not noticed the increasing use of the term “cyber” in the press recently. Anything security related is now a cyber risk, a cyber incident or a cyber attack. Governments ...
Blog Entry by James Hanlon | 10 Jun 2013 | 1 comment